Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5



Similar documents
Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

VMware ESXi 3.5 update 2

VMware ESXi 5.0 Installation and RWC2 Tips and Tricks

vsphere Security ESXi 5.5 vcenter Server 5.5 EN

vsphere Security ESXi 6.0 vcenter Server 6.0 EN

VMware vsphere: Fast Track [V5.0]

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Installing and Administering VMware vsphere Update Manager

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

ovirt Introduction James Rankin Product Manager Red Hat Virtualization Management the ovirt way

Deploying and updating VMware vsphere 5.0 on HP ProLiant Servers

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

Management of VMware ESXi. on HP ProLiant Servers

Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1)

What s New in VMware vsphere 5.0 Platform

VMware vsphere-6.0 Administration Training

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

vsphere Upgrade vsphere 6.0 EN

STREAM FRBC

Migrating to ESXi: How To

VMware vsphere 5.0 Evaluation Guide

VMware ESXi in a Cloud-based Lab David Davis, VCP, VCAP, and vexpert

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

Vmware VSphere 6.0 Private Cloud Administration

Install Guide for JunosV Wireless LAN Controller

VMware vsphere 5.0 Boot Camp

Virtualization Management the ovirt way

Acronis Backup & Recovery 11.5

GRAVITYZONE HERE. Deployment Guide VLE Environment

Data Center Connector for vsphere 3.0.0

vsphere Single Host Management

Core Protection for Virtual Machines 1

Paragon Protect & Restore

Paragon Protect & Restore

Chapter 14 Virtual Machines

IBM Upward Integration Module (UIM) Advanced Technical Sales Wayne Wigley

VMware View Backup Best Practices

vsphere Replication for Disaster Recovery to Cloud

Managing Physical and Virtual Machines in Paragon Protect & Restore

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:

The Architecture of VMware ESXi WHITE PAPER

How to Setup and Configure ESXi 5.0 and ESXi 5.1 for OpenManage Essentials

ESX 4 Patch Management Guide ESX 4.0

VMware vsphere 5.1 Advanced Administration

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

VMsources Group Inc

Thinspace deskcloud. Quick Start Guide

vsphere Security Update 2 ESXi 5.5 vcenter Server 5.5 EN

Sichere Virtualisierung mit VMware

vsphere Security Update 1 ESXi 5.1 vcenter Server 5.1 EN

Virtualization Case Study

Mitigating Information Security Risks of Virtualization Technologies

Introduction to ovirt

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

How to Backup and Restore a VM using Veeam

Virtualization System Security

ClearPass Policy Manager 6.3

[VADP OVERVIEW FOR NETBACKUP]

What s New in VMware vsphere 4.1 VMware vcenter. VMware vsphere 4.1

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

What s New with VMware Virtual Infrastructure

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

Citrix XenServer 7 Feature Matrix

Building a Penetration Testing Virtual Computer Laboratory

Quick Start Guide for VMware and Windows 7

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

VMware vcenter Log Insight Administration Guide

Step by Step: vcenter Syslog Collector installation

Shavlik NetChk Protect 7.1

How to install software on VMware ESXi 4.0/4.1

Virtual Computing and VMWare. Module 4

VirtualclientTechnology 2011 July

vsphere Replication for Disaster Recovery to Cloud

Dell EqualLogic Multipathing Extension Module

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

VMware vsphere: [V5.5] Admin Training

VX 9000E WiNG Express Manager INSTALLATION GUIDE

VMware vcenter Update Manager Administration Guide

ESX System Analyzer Version 1.0 Installation Guide

ISRX207VE11-1. NEC Storage PathManager for VMware Installation Guide

Cookbook Backup, Recovery, Archival (BURA)

GRID VGPU FOR VMWARE VSPHERE

Virtual Appliance Setup Guide

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant

NetIQ Aegis Adapter for VMware vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server

Acronis Backup & Recovery 11

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

EMC Data Domain Management Center

Quick Start - Virtual Server idataagent (VMware)

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide

W H I T E P A P E R. Best Practices for Building Virtual Appliances

Transcription:

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs and Activity Monitoring Understanding the Hardening Guidelines 2

ESXi Architectural Overview Secure by Design

ESXi Architectural Overview Full-featured hypervisor Superior consolidation, scalability & reliability Designed from the ground up to run VMs Small, light-weight and secure OS-Independent, thin architecture Digitally signed software packages Streamlined deployment and configuration Small code base with minimal configuration Rapid provisioning with stateless support 4

ESXi Architectural Overview Simplified hypervisor patching and updating Small code base produces fewer patches Easy recovery with dual-image architecture VMware and 3rd party components updated independently Memory Hardening Kernel, User mode applications & executable components are located at random, non-predictable memory addresses Trusted Platform Module(TPM) Leverages Intel TPM to provide attestation of hypervisor image based on hardware root of trust. 5

ESXi Architectural Overview Digital signatures ensure integrity of kernel modules Rich API allows agentless management CLI Commands for Configuration and Support Agentless System Management Agentless Hardware Monitoring VM VM VM VMware Management Network VMkernel Common Information Model Local Support Consoles Infrastructure Agents-NTP,Syslog VM Support & Resource Management 6

ESXi Software Packaging Security Starts Before You Install

vsphere Installation Bundles (VIBs) ESXi distributed as collection of vsphere Installation Bundles(VIBs) ~60 VIBs in VMware distribution ~300MB (~150MB with out VMware Tools) Additional 3rd Party/Partner VIBs also available VMware and Partner VIBs digitally signed 8

ESXi Image Profile Image Profile assigns an Acceptance Level VMware Certified VMware Supported Partner Supported Community Supported Only VIBs signed at or above the assigned Acceptance Level can be added to the Image Acceptance Level can be changed using ESXCLI 9

Modifying/Customizing Image Profiles Image Builder CLI Included with PowerCLI Create Image Profiles Add/Remove 3rd Party drivers Export Images ISO Image-boots host into ESXi Installer Import to Update Manager ZIP Used with Auto Deploy Offline repository 10

The ESXi Firewall Controlling Access to the Host

The ESXi Firewall ESXi management network protected by local firewall Non-essential incoming/outgoing traffic blocked by default Control service start-up on boot Ability to restrict access to range of IP addresses 12

The ESXi Firewall Firewall configurable from GUI, CLI and Host Profile 13

ESXi Shell & Local User Security

ESXi - User Model Security Enhancements Named users provides for more auditability Local users with admin privileges equivalent to root Users operate using their own account, full admin privileges Limit use of the root account 15

ESXi - Shell Timeout ESXiShellTimeOut Advanced setting used to set timeout for Shell/SSH availability ESXiShellInteractiveTimeOut (*new in 5.1*) Advanced Setting used to automatically timeout inactive Shell Sessions 16

ESXi - Lockdown Mode What is Lockdown mode Restrict users from logging in directly to the hypervisor Only vcenter (vpxuser) allowed to manage the host in lockdown mode ESXi Shell access denied for all users Why lock down your infrastructure? Single point of management for your infrastructure - through vcenter 17

ESXi Authentication through Active Directory To protect Active Directory domain user credentials use the VMware Authentication Proxy Included with the vcenter Server install media Uses certificate vs. storing/passing domain credentials Configure in Host Profile to prevent storing AD user credentials 18

ESXi and Active Directory cont. By default users in the Active Directory ESX Admins group are granted administrator access To disable this behaviour disable esxadminsgroupautoadd To change the group name set esxadminsgroup 19

Host Logs and Activity Monitoring

ESXi Improved Logging All administrator actions logged (commands executed) All authentication events logged successful & unsuccessful Direct Console activity is logged using the username instead if dcui user 21

ESXi Logs: Admin Activity on Hypervisor Shell 2012-07-10T13:03:43Z ESXShell: ESXi shell login enabled 2012-07-10T13:03:43Z SSH: SSH login enabled 2012-07-10T13:03:55Z ESXShell: ESXi Shell available 2012-07-10T13:03:57Z shell[1000047077]: Interactive shell session started 2012-07-10T13:03:59Z shell[1000047077]: [root]: vmware -vl 2012-07-10T15:49:02Z shell[1000064535]: Interactive shell session started 2012-07-10T15:49:06Z shell[1000064535]: [testuser]: ls -la 2012-07-10T15:49:15Z shell[1000064535]: [testuser]: cat /etc/passwd 2012-07-10T15:49:22Z shell[1000064535]: [testuser]: vi etc/passwd 2012-07-10T15:49:28Z shell[1000064535]: [testuser]: cat /etc/group 2012-07-10T15:49:38Z shell[1000064535]: [testuser]: cat /var/log/shell.log Time Stamp Username Command Executed 22

Hardening Guidelines Classification & Customization based on the environment needs

Define the Threat Model-ESXi 24

Risk Assessment & Control Leveraging the Hardening Guide Environment Profiling - Classification of environment based on security needs Types of Guidelines & Recommendation Levels Implementation 25

Environment Profiling Profile Environment Guidelines Profile 3 Enterprise Should be implemented in all environments Profile 2 DMZ Should be implemented for more sensitive environments, e.g. those handling more sensitive data, those subject to stricter compliance rules, etc. Profile 1 SSLF-Specialized Security Limited Functionality Should be implemented in the highest security environments, e.g. top-secret government or military, extremely sensitive data, etc. 26

Control Type Control Type Operational Definition Recommendations on how to operate or interact with the administrative components of the system. Configuration Recommends a certain configuration of components, either to reduce risk or to provide a compensating control Parameter Specifies a configuration parameter to enable or disable in specific products 27

Implementation - An abstract from the hardening guide Control Type Component Title Vulnerability Discussion Profile Parameter ESXI Disable HGFS Prevents file transfer to Guest OS 1 Operational ESXI-Storage Zero out vmdk prior to deletion. Shreds sensitive data to prevent data reconstruction from physical disk 1,2 Configuration ESXI Configure the ESXi host firewall to restrict access to services running on the host Restrict Access 1,2,3 28

ESXi Security Summary ESXi is a Full Featured Hypervisor Small, light-weight and secure Designed for one purpose - to host VMs ESXi Image Comprised of VIBs Ensures integrity, prevents tampering, instils confidence Enhanced auditing capabilities All activity logged under named user accounts Locked down Firewall, ESXiShellTimout, ESXiShellInteractiveTimeOut, Lockdown Mode Customization based on environment needs Align with hardening guide 29

Questions? Write to me @ Cedric.rajendran@gmail.com www.virtualknightz.com 30